3.9. Guided configuration Security Policy

../../_images/secpolicy-path.png

Security policies are the set of rules that govern how traffic is processed in SSLO. The "actions" a rule can take include:

  • Whether or not to allow the traffic
  • Whether or not to decrypt the traffic
  • Which service chain (if any) to pass the traffic through

The SSLO Guided Configuration presents an intuitive rule-based, drag-and-drop user interface for the definition of security policies.

../../_images/module1-361.png
  • In the Security Policy, click the pencil at the far right of the All Traffic rule.
../../_images/secpolicy.png
  • Click on the SSL Proxy Action drop down menu and select Bypass.
  • Click on the Service Chain drop down menu and select ssloSC_all_services.
  • Click OK.

The preliminary Security Policy has now been configured.

Click Save & Next to continue to the next stage.

../../_images/module1-410.png

Tip

In the background, SSLO maintains these security policies as visual per-request policies. If traffic processing is required that exceeds the capabilities of the rule-based user interface, the underlying per-request policy can be modified directly.

Warning

In a production environment, additional policy customization is possible manually outside of guided configuration, but strong caution should be taken. If the per-request policy is modified directly, any future guided configuration changes will overwrite the manual changes.

Note

There are no additional hands-on steps that need to be taken before proceeding to the next section. The information below is intended to provide additional context on the security policy.

3.9.1. Security policy

Note

The Category Lookup (All) condition provides categorization for TLS SNI, HTTP Connect and HTTP Host information.

In the list of rules, notice that the All Traffic rule intercepts but does not send traffic to any service chain.

  • Server Certificate Status Check - this option inserts additional security policy logic to validate the remote server certificate and return a blocking page to the user if the certificate is untrusted or expired. One or both of the Certificate Response options on the SSL Configuration page (Expire Certificate Response and Untrusted Certificate Response) must be set to 'ignore'. SSLO will "mask" the server certificate's attributes in order to present a blocking page with a valid forged certificate. For this lab, leave this option disabled.
  • Proxy Connect - this option allow you to add an upstream explicit proxy to your security rule chaining. You can add multiple proxy devices, or pool members, as necessary. For this lab, leave this option disabled.